The Latest

Classical cryptography provides security based on unproven
mathematical assumptions and depends on the technology available to
an eavesdropper. But, these things might not be enough in the near future to
guarantee
cyber security. We need something that
provides unconditional security. We need quantum cryptography.
more>>

If you follow my columns in Linux Journal, you
probably are aware
that I'm a big fan of the command line. When it comes to getting things
done efficiently, most of the time the command line can't be beat. more>>

The de facto standard for port scanning always has been the venerable
Nmap program. The command-line tool is indeed very powerful, but I've
only ever seen it work with Linux, and every time I use it, I need to
read the man page to figure out the command flags.
more>>

The truth is, I really don't have anything on my hard drive that I would
be upset over someone seeing. I have some cat photos. I have a few text
files with ideas for future books and/or short stories, and a couple
half-written starts to NaNoWriMo novels. It would be easy to say that
there's no point encrypting my hard drive, because I have nothing to
hide. more>>

For the past few months, I've been covering different software packages
for scientific computations. For my next several articles, I'm going to be
focusing on using Python to come up with your own algorithms for
your scientific problems. more>>

Most people with Internet access in their houses have visited a speed-test
Web site to make sure they're getting somewhere close to the speed
they're overpaying for. I'm paying more than $100 a month for my
business-class connection from Charter, so on a regular basis, I make sure I'm
getting the advertised speed. more>>

This article is the second in a series on DNSSEC. In the first one, I gave a
general overview of DNSSEC concepts to lay the foundation for this article, which
discusses how to enable DNSSEC for a zone using BIND. more>>

Several decent video editors are available on the Linux
platform. Kdenlive, OpenShot, Cinelerra and Pitivi are those that come to
mind as "big players" in an admittedly small market. I've used them all
through the years, with varying levels of success. more>>

I never have a Twitter app crash in the middle of a Tweet. That wouldn't
be too terrible to deal with. No, for me, it seems my e-mail application
decides to crash after I've spent 20 minutes thumbing out a reply while
sitting in a crowded airport. If you've ever lost a love letter, term
paper, shopping list or world-class Facebook post, Type Machine is the
perfect app for you.
more>>

If you need remote access to a machine, you'll probably use SSH, and
for a good reason. The secure shell protocol uses modern cryptography
methods to provide privacy and confidentiality, even over an unsecured,
unsafe network, such as the Internet. more>>

It's nice to have many people visit your Web site. It's even better
when people don't just come to your site, but also enjoy your content.
But, best of all is when visitors to your site do what you would
like them to do—sign up for your newsletter, register for your SaaS
application or buy one of your products.
more>>

I've been a sysadmin for a long time, and part of being a sysadmin
is doing more than is humanly possible. Sometimes that means writing
wicked cool scripts, sometimes it means working late, and sometimes
it means learning to say no. Unfortunately, it also sometimes means
cutting corners. I confess, I've been "that guy" more than once. A good
example is SELinux. more>>

Even the most beautiful Rails application can lose its elegance if not
deployed correctly. Like other Ruby frameworks or languages, such as
Sinatra, Rails is based on the Rack interface. This article
provides a basic introduction to Rack hosting and Rack-based application
deployments.
more>>

Generally, good programming is considered to be the measured application
of an art form, craft or discipline, with the objective of producing
a competent and evolving business solution. In traditional environments,
computer programming is a practice that has multiple phases, such as
designing, developing, testing, debugging and maintaining application
code. more>>

I've been building computers since the 1990s, so I've seen a lot of
new technologies work their way into the mainstream. Most were the
steady, incremental improvements predicted by Moore's law, but others were
game-changers, innovations that really rocketed performance forward in a
surprising way. more>>

Trending Topics

Webinar: 8 Signs You’re Beyond Cron

Scheduling Crontabs With an Enterprise Scheduler
11am CDT, April 29th

Join Linux Journal and Pat Cameron, Director of Automation Technology at HelpSystems, as they discuss the eight primary advantages of moving beyond cron job scheduling. In this webinar, you’ll learn about integrating cron with an enterprise scheduler.